CVE-2021-26325Improper Input Validation in AMD 3RD GEN AMD Epyc

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 68.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 16
Latest updateMay 24

Description

Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages21 packages

CVEListV5amd/3rd_gen_amd_epycunspecifiedMilanPI-SP3_1.0.0.4
NVDamd/epyc_72f3_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_7313_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_7343_firmware< milanpi-sp3_1.0.0.4
NVDamd/epyc_73f3_firmware< milanpi-sp3_1.0.0.4

🔴Vulnerability Details

2
GHSA
GHSA-v4mm-mqqh-4wf8: Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service2022-05-24
CVEList
CVE-2021-26325: Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service2021-11-16
CVE-2021-26325 — Improper Input Validation in AMD | cvebase